- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on April 27, 2016 @ 12:56

Image courtesy of Flickr user Pabs D

The major cyber story of the week is the long-awaited release of Australia’s Cyber Security Strategy [1], the first document of its kind since 2009 [2]. The Strategy outlines $230 million of funding [3] for enhanced cyber security efforts over four years, with a focus on five key themes [4]. Specifically, significant investment will be funnelled into improving [5] the cyber capabilities of the AFP, Crime Commission, Australian Signals Directorate and Australia’s Computer Emergency Response Team (CERT Australia).

The Strategy’s overarching principle of public–private sector partnership [6] informs the establishment of a Cyber Security Growth Centre and Joint Cyber Threat centres in capital cities. The government will also relocate Australia’s Cyber Security Centre [3] from the highly classified ASIO building to allow greater private-sector access.

The Strategy establishes new positions [7]: a Minister Assisting the Prime Minister on Cyber Security, a Special Advisor on Cyber Security (to be filled by Alastair MacGibbon), and a Cyber Ambassador to be appointed by Julie Bishop. Further, the development of a sustainable cyber-savvy workforce will be encouraged through investment in STEM education and the creation of academic centres of excellence [8] in universities.

Notably, the Strategy explicitly refers to Australia’s offensive cyber capabilities—a first in Australia’s rhetoric [9] surrounding cyber security. At the launch, Turnbull stated [10] than an ‘offensive cyber capability, housed in the Australian Signals Directorate, provides another option for the Government to respond’.

The Strategy has been hailed as ‘the most important and innovative government strategy yet written [11]’. However, there has been criticism of the document’s language not addressing the seriousness of contemporary cyber threats strongly or directly enough [12]. Others are concerned that this underestimation is reflected in the funding on offer, which falls short in comparison [13] to the billions being spent by Australia’s peers. Last year, the UK announced plans to invest £1.9 billion [14] (A$3 billion) in cybersecurity, while the US has recently upped its spending by US$5 billion to a total of US$19 billion [15] (A$24.8 billion). Check out some in-depth analysis of the new Strategy from the ICPC team here [16], here [17] and here [18].

In the US, tech firms have banded together [19] to oppose a bill that would effectively outlaw end-to-end encryption [20] and require companies to help the government decrypt customer data. A coalition of companies—including Apple, Facebook, Google, Netflix, Microsoft and Twitter—wrote an open letter [21] to the sponsors of the new bill [22], Senators Richard Burr and Dianne Feinstein. The tech giants warn against [23] the ‘unworkable policies around encryption that would weaken the very defences we need to protect us from people who want to cause economic and physical harm’.

In an amusing concurrent development, popular instant messaging service Viber just announced [24] it will make end-to-end encryption the default for its 700 million users. The company stated [25] that it’s ‘proud that our users can confidently use Viber without war of their messages being intercepted’. This comes only a few weeks after WhatsApp [26] made the same transition.

This week also brought an exciting development in Artificial Intelligence (AI) technology. Scientists from MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL [27]), in partnership with machine learning start-up PatternEx [28], have developed a hybrid machine [29] that can learn how to identify 85% of cyber attacks. The findings, which merge state-of-the-art AI and analyst intuition, were published in a paper titled AI2: Training a big data machine to defend [30]. The initiative works on an active learning system, where artificial intelligence network assessments are verified by an analyst, and any corrections are integrated back into the machine as a feedback loop [31] that continues to improve its detection accuracy. The system can reportedly reduce false positives [32] by a factor of five and is about three times more accurate than comparable technologies—a major development in the potential of AI for cybersecurity.

Staying stateside, a Bloomberg report [33] has revealed that a US$12 billion tactical mobile Internet network used by the US Army suffers significant cyber security vulnerabilities. The Warfighter Information Network-Tactical Increment 2 [34], or WIN-T, uses satellite and radio technology to offer secure voice, video and data communications to troops on the move. The network is deployed [35] to 11 of the Army’s combat brigades and is already in use in Iraq and Afghanistan. However, an assessment conducted by Johns Hopkins University and the Army Research Laboratory recommended [36] ‘improvement to user training techniques and hardware and software enhancements to harden against the cyberthreat’. In light of those findings, the US Army and General Dynamics are undertaking efforts to upgrade systems already in use and line-up improvements that will be deployed through 2028.

Notwithstanding its apparently flawed military cyber defences, the US has been having fun with its offensive cyber rhetoric this week. Check out this piece from The New York Times [37] to understand what US Deputy Defense Secretary Roger Work really means when he says the US is dropping ‘cyberbombs’ on ISIS.



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-117/

URLs in this post:

[1] Australia’s Cyber Security Strategy: https://cybersecuritystrategy.dpmc.gov.au/

[2] since 2009: https://www.ag.gov.au/RightsAndProtections/CyberSecurity/Documents/AG%20Cyber%20Security%20Strategy%20-%20for%20website.pdf

[3] $230 million of funding: http://www.itnews.com.au/news/govt-to-spend-230m-on-cyber-security-strategy-418409

[4] five key themes: https://cybersecuritystrategy.dpmc.gov.au/executive-summary/index.html

[5] improving: http://www.theaustralian.com.au/business/technology/malcolm-turnbull-launches-230m-cyber-security-strategy/news-story/37ebefcf8a639638b445de6de8a6569e

[6] public–private sector partnership: http://www.governmentnews.com.au/2016/04/turnbull-orders-cyber-security-cohesion-hacking-paybacks/

[7] new positions: http://www.businessinsider.com.au/australia-is-spending-230-million-on-a-new-cyber-security-strategy-2016-4

[8] academic centres of excellence: http://www.computerworld.com.au/article/598438/turnbull-launches-government-cyber-security-strategy/

[9] first in Australia’s rhetoric: http://www.afr.com/news/special-reports/cyber-security/the-cyber-security-strategy-australia-can-attack-as-well-as-defend-20160421-gobk99

[10] Turnbull stated: http://www.pm.gov.au/media/2016-04-21/launch-australias-cyber-security-strategy-sydney

[11] the most important and innovative government strategy yet written: http://newsroom.unsw.edu.au/news/social-affairs/cybersphere-globe%E2%80%99s-new-battlefront

[12] strongly or directly enough: http://thediplomat.com/2016/04/australia-still-doesnt-see-a-cyberattack-as-the-menace-the-united-states-fears/

[13] falls short in comparison: https://theconversation.com/the-cyber-security-strategy-is-only-a-small-step-in-the-right-direction-58208

[14] £1.9 billion: https://www.gov.uk/government/speeches/chancellors-speech-to-gchq-on-cyber-security

[15] US$19 billion: http://www.reuters.com/article/us-obama-budget-cyber-idUSKCN0VI0R1

[16] here: http://www.aspistrategist.org.au/the-new-australian-cyber-security-strategy-a-positive-first-step-but-a-long-road-ahead/

[17] here: http://www.aspistrategist.org.au/australias-cyber-smart-workforce/

[18] here: http://www.aspistrategist.org.au/australias-new-cyber-strategy-grabbing-the-international-initiative/

[19] tech firms have banded together: http://thehill.com/policy/cybersecurity/277005-silicon-valley-giants-slam-encryption-bill-as-unworkable?utm_source=&utm_medium=email&utm_campaign=1397

[20] effectively outlaw end-to-end encryption: http://www.wired.com/2016/04/senates-draft-encryption-bill-privacy-nightmare/

[21] open letter: http://reformgs.tumblr.com/post/143084034822/letter-to-chairman-burr-and-vice-chairman

[22] new bill: https://josephhall.org/f0eabaa89b8ee38577bf7d0fd50ddf0d58ecd27a/307378123-Burr-Encryption-Bill-Discussion-Draft.pdf

[23] warn against: http://www.businessinsider.com.au/tech-industry-not-supporting-burr-feinstein-encryption-bill-2016-4?r=US&IR=T

[24] just announced: http://www.wired.com/2016/04/viber-encrytpion/

[25] stated: https://www.viber.com/en/blog/2016-04-19/giving-our-users-control-over-their-private-conversations

[26] only a few weeks after WhatsApp: http://www.computerworld.com.au/article/598317/viber-follows-whatsapp-adding-end-to-end-encryption-its-messaging-service/

[27] CSAIL: http://www.csail.mit.edu/System_predicts_85_percent_of_cyber_attacks_using_input_from_human_experts%20

[28] PatternEx: https://www.patternex.com/

[29] developed a hybrid machine: http://www.csail.mit.edu/System_predicts_85_percent_of_cyber_attacks_using_input_from_human_experts

[30] AI2: Training a big data machine to defend: http://people.csail.mit.edu/kalyan/AI2_Paper.pdf

[31] feedback loop: http://www.computerworld.com/article/3057590/security/ai-humans-serious-cybersecurity.html

[32] reduce false positives: https://nakedsecurity.sophos.com/2016/04/20/the-ai-system-that-can-detect-85-of-cyber-attacks-with-a-little-human-help/

[33] Bloomberg report: http://www.bloomberg.com/news/articles/2016-04-22/hacking-risks-found-in-u-s-army-s-12-billion-mobile-network-inbhkur4

[34] Warfighter Information Network-Tactical Increment 2: http://peoc3t.army.mil/wint/inc2.php

[35] deployed: http://www.ibtimes.co.uk/us-armys-12bn-mobile-internet-network-contains-cybersecurity-vulnerabilities-1556486

[36] recommended: http://fortune.com/2016/04/22/army-network-vulnerable-hackers/

[37] The New York Times: http://www.nytimes.com/2016/04/25/us/politics/us-directs-cyberweapons-at-isis-for-first-time.html?_r=0

Copyright © 2016 The Strategist. All rights reserved.